Zero-knowledge proof

Results: 211



#Item
101Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-05-14 14:54:31
102Minimal Assumptions for Efficient Mercurial Commitments∗ Yevgeniy Dodis† Abstract Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduc

Minimal Assumptions for Efficient Mercurial Commitments∗ Yevgeniy Dodis† Abstract Mercurial commitments were introduced by Chase et al. [8] and form a key building block for constructing zero-knowledge sets (introduc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-11-30 14:18:39
103Round-Optimal Zero-Knowledge Proofs of Knowledge for NP Li HongDa†1 , Feng DengGuo2 , Li Bao1 , Xu HaiXia1 1  State Key Lab of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, C

Round-Optimal Zero-Knowledge Proofs of Knowledge for NP Li HongDa†1 , Feng DengGuo2 , Li Bao1 , Xu HaiXia1 1 State Key Lab of Information Security, Graduate University of Chinese Academy of Sciences, Beijing, C

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-15 09:42:20
104Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim†  May 4, 2010

Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-04 07:57:36
105Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang1,∗ Dingyi Pei1,2 Zhuojun Liu3

Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs Chunming Tang1,∗ Dingyi Pei1,2 Zhuojun Liu3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-29 06:02:29
106On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky∗ and Omer Paneth† Tel Aviv University and Boston University April 23, 2015 This is an out of date draft that is

On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography Nir Bitansky∗ and Omer Paneth† Tel Aviv University and Boston University April 23, 2015 This is an out of date draft that is

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-23 15:21:41
107Analysis of some natural variants of the PKP Algorithm Rodolphe LAMPE and Jacques PATARIN PRISM - University of Versailles  In 1989, Adi Shamir [15] proposed a new zero-knowledge identication scheme

Analysis of some natural variants of the PKP Algorithm Rodolphe LAMPE and Jacques PATARIN PRISM - University of Versailles In 1989, Adi Shamir [15] proposed a new zero-knowledge identication scheme

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-07-04 14:25:42
108What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

What Information is Leaked under Concurrent Composition?∗ Vipul Goyal Microsoft Research India and

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 11:22:52
109Efficiency Limitations for Σ-Protocols for Group Homomorphisms ? (Full Version) Endre Bangerter1 , Jan Camenisch2 , and Stephan Krenn3 1

Efficiency Limitations for Σ-Protocols for Group Homomorphisms ? (Full Version) Endre Bangerter1 , Jan Camenisch2 , and Stephan Krenn3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-04 11:23:33
110Zero-Knowledge Accumulators and Set Operations Esha Ghosh1 , Olga Ohrimenko2 , Dimitrios Papadopoulos3 , Roberto Tamassia1 and Nikos Triandopoulos4,3 1 Dept. of Computer Science, Brown University, Providence RI, USA esha

Zero-Knowledge Accumulators and Set Operations Esha Ghosh1 , Olga Ohrimenko2 , Dimitrios Papadopoulos3 , Roberto Tamassia1 and Nikos Triandopoulos4,3 1 Dept. of Computer Science, Brown University, Providence RI, USA esha

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-28 18:00:30